CVE-2026-23755

7.3 HIGH

📋 TL;DR

D-Link D-View 8 installer versions 2.0.1.107 and below contain a DLL preloading vulnerability where the installer loads version.dll from its execution directory with elevated privileges. When a user runs the installer and approves the UAC prompt, an attacker can place a malicious version.dll in the same directory to execute arbitrary code with administrator privileges, potentially leading to full system compromise. This affects administrators and users installing or updating D-View 8 on Windows systems.

💻 Affected Systems

Products:
  • D-Link D-View 8
Versions: 2.0.1.107 and below
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to run the installer and approve UAC prompt; vulnerability is in the installer itself, not the installed software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrator privileges, allowing complete control over the system, data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to malware installation, credential harvesting, or lateral movement within the network.

🟢

If Mitigated

Limited impact if users avoid running untrusted installers or if proper application whitelisting prevents unauthorized DLL execution.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access or social engineering to place malicious DLL; UAC prompt must be approved by user.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for updated version

Vendor Advisory: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10471

Restart Required: No

Instructions:

1. Download the latest D-View 8 installer from D-Link's official website. 2. Uninstall any existing vulnerable versions. 3. Run the updated installer with administrator privileges. 4. Verify installation completes without errors.

🔧 Temporary Workarounds

Disable DLL search path hijacking via registry

windows

Modify Windows registry to prevent DLL loading from current directory for all applications.

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager" /v CWDIllegalInDllSearch /t REG_DWORD /d 0xffffffff /f

Use Microsoft Enhanced Mitigation Experience Toolkit (EMET)

windows

Configure EMET to block DLL preloading attacks for the installer executable.

🧯 If You Can't Patch

  • Avoid running the D-View 8 installer from untrusted directories or network shares.
  • Implement application whitelisting to prevent execution of unauthorized DLLs.

🔍 How to Verify

Check if Vulnerable:

Check the installer version by right-clicking the installer file, selecting Properties, and viewing the Details tab; if version is 2.0.1.107 or lower, it is vulnerable.

Check Version:

Not applicable for installer; use GUI method as described.

Verify Fix Applied:

After patching, verify the installed D-View 8 version is above 2.0.1.107 via the application's about or help menu.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual paths (Event ID 7 in Microsoft-Windows-Diagnostics-Performance)
  • UAC elevation logs for D-View installer processes.

Network Indicators:

  • Unusual outbound connections from installer process post-execution.

SIEM Query:

EventID=7 AND ProcessName="D-View*" AND DLLPath CONTAINS "version.dll"

🔗 References

📤 Share & Export